New vulnerabilities upon Grain v0 Boolean function through fault injection analysis
Algebraic attacks on stream cipher are very important in cryptography as well as in cryptanalysis. Generally, increasing degree of the equation will make an algebraic attack to the equation hardest. In conducting this analysis, we aim to decrease the degree of the targeted Boolean equation by c...
| Main Authors: | Omar@Othman, Wan Zariman, Kamel Ariffin, Muhammad Rezal, Mohd. Jawi, Suhairi, Mahad, Zahari |
|---|---|
| Format: | Article |
| Published: |
CyberSecurity Malaysia Publication
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/94355/ |
Similar Items
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
by: Omar @ Othman, Wan Zariman, et al.
Published: (2020)
by: Omar @ Othman, Wan Zariman, et al.
Published: (2020)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Efficient minimisation of Boolean functions
by: V. C., Prasad
Published: (2008)
by: V. C., Prasad
Published: (2008)
Evolution of the Boolean function manipulation
by: Sim, Poh Ching, et al.
Published: (2002)
by: Sim, Poh Ching, et al.
Published: (2002)
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
by: Othman, M. R., et al.
Published: (2003)
by: Othman, M. R., et al.
Published: (2003)
AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem
by: Mahad, Zahari, et al.
Published: (2012)
by: Mahad, Zahari, et al.
Published: (2012)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2015)
by: Mahad, Zahari, et al.
Published: (2015)
AAβ public-key cryptosystem - a practical implementation of the new asymmetric
by: Mahad, Zahari, et al.
Published: (2013)
by: Mahad, Zahari, et al.
Published: (2013)
AAβ public key cryptosystem - a comparative analysis against RSA and ECC
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2012)
Rabin-RZ: a new efficient method to overcome Rabin cryptosystem decryption failure problem
by: Mahad, Zahari, et al.
Published: (2014)
by: Mahad, Zahari, et al.
Published: (2014)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Pattern Detection Approach To Boolean Function Classification
by: Mustapha, Muhazam
Published: (2004)
by: Mustapha, Muhazam
Published: (2004)
Cryptographic boolean functions: transform domain perspective
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
by: Mohamed Rafiq, Hashum, et al.
Published: (2011)
Manipulation of boolean functions based on decision diagrams
by: Sim, Poh Ching
Published: (2003)
by: Sim, Poh Ching
Published: (2003)
Simplication of boolean function based on simplification rules
by: Chin, Kui Fern
Published: (2003)
by: Chin, Kui Fern
Published: (2003)
New vulnerabilities of RSA modulus type N = p²q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2016)
Arithmatic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2009)
by: Azram, Mohammad, et al.
Published: (2009)
Arithmetic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2009)
by: Azram, Mohammad, et al.
Published: (2009)
Arithmetic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2010)
by: Azram, Mohammad, et al.
Published: (2010)
Arithmetic version of boolean algebra
by: Azram, Mohammad, et al.
Published: (2009)
by: Azram, Mohammad, et al.
Published: (2009)
Successful cryptanalytic attacks upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2019)
by: Abubakar, Saidu Isah, et al.
Published: (2019)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
New weak findings upon RSA modulo of type N = p2 q
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
by: Kamel Ariffin, Muhammad Rezal, et al.
Published: (2016)
New vulnerability of RSA modulus type N = p2q
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2017)
An Efficient Method for Generating Optimal OBDD of Boolean Functions
by: Singh, Ashutosh, et al.
Published: (2008)
by: Singh, Ashutosh, et al.
Published: (2008)
A new simultaneous diophantine attack upon RSA moduli N = pq
by: Abubakar, Saidu Isah, et al.
Published: (2018)
by: Abubakar, Saidu Isah, et al.
Published: (2018)
Truncated Boolean Matrices For Dna Computation
by: Nordiana, Rajaee, et al.
Published: (2014)
by: Nordiana, Rajaee, et al.
Published: (2014)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Efficient methods to overcome Rabin cryptosystem decryption failure
by: Mahad, Zahari, et al.
Published: (2017)
by: Mahad, Zahari, et al.
Published: (2017)
Analysis on the Rabin-p cryptosystem
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2016)
Design and analysis of Rabin-p key encapsulation mechanism for CyberSecurity Malaysia MySEAL initiative
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2019)
Enhanced AAβ cryptosystem - a comparative analysis
by: Mahad, Zahari, et al.
Published: (2019)
by: Mahad, Zahari, et al.
Published: (2019)
Enhanced AAβ cryptosystem: the design
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2018)
Waste simplification for warehouse using Boolean logic
by: Sarifudin, M. S., et al.
Published: (2019)
by: Sarifudin, M. S., et al.
Published: (2019)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Modelling the XOR/XNOR Boolean Functions Complexity Using Neural Network
by: Prasad, P. W. C., et al.
Published: (2006)
by: Prasad, P. W. C., et al.
Published: (2006)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
Similar Items
-
Findings Annihilator(s) via Fault Injection Analysis (FIA) on Boolean Function of LILI-128
by: Omar @ Othman, Wan Zariman, et al.
Published: (2020) -
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019) -
Efficient minimisation of Boolean functions
by: V. C., Prasad
Published: (2008) -
Evolution of the Boolean function manipulation
by: Sim, Poh Ching, et al.
Published: (2002) -
Process fault detection and diagnosis using Boolean representation on fatty acid fractionation column
by: Othman, M. R., et al.
Published: (2003)